Sciweavers

301 search results - page 43 / 61
» Privacy in GLAV Information Integration
Sort
View
HIKM
2006
ACM
14 years 2 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...
ACSAC
2000
IEEE
14 years 1 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
WWW
2007
ACM
14 years 9 months ago
Organizing Publications and Bookmarks in BibSonomy
BibSonomy is a web-based social resource sharing system which allows users to organise and share bookmarks and publications in a collaborative manner. Apart from standard folksono...
Andreas Hotho, Beate Krause, Christoph Schmitz, Ge...
PODS
2004
ACM
109views Database» more  PODS 2004»
14 years 8 months ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 2 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick